Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,203 Full-Text Articles 2,646 Authors 3,318,745 Downloads 145 Institutions

All Articles in National Security Law

Faceted Search

3,203 full-text articles. Page 53 of 117.

Soldier 2.0: Military Human Enhancement And International Law, Heather A. Harrison Dinniss, Jann K. Kleffner 2016 U.S. Naval War College

Soldier 2.0: Military Human Enhancement And International Law, Heather A. Harrison Dinniss, Jann K. Kleffner

International Law Studies

Advances in technologies that could endow humans with physical or mental abilities that go beyond the statistically normal level of functioning are occurring at an incredible pace. The use of these human enhancement technologies by the military, for instance in the spheres of biotechnology, cybernetics and prosthetics, raise a number of questions under the international legal frameworks governing military technology, namely the law of armed conflict and human rights law. The article examines these frameworks with a focus on weapons law, the law pertaining to the detention of and by “enhanced individuals,” the human rights of those individuals and their …


Newsroom: Margulies Cited On Military Commissions 11-04-2016, Peter S. Margulies 2016 Roger Williams University School of Law

Newsroom: Margulies Cited On Military Commissions 11-04-2016, Peter S. Margulies

Life of the Law School (1993- )

No abstract provided.


The Lawyers' War: Counterterrorism From Bush To Obama To Trump, Dawn E. Johnsen 2016 Indiana University Maurer School of Law

The Lawyers' War: Counterterrorism From Bush To Obama To Trump, Dawn E. Johnsen

Articles by Maurer Faculty

No abstract provided.


National Security In The Information Age: Are We Heading Toward Big Brother?, William C. Banks, Jake Laperruque, Douglas Cox, Lt. Colonel Jeffrey Addicott, Paul Gill, Douglas A. Ramseur, Thomas J. Ridge 2016 University of Richmond

National Security In The Information Age: Are We Heading Toward Big Brother?, William C. Banks, Jake Laperruque, Douglas Cox, Lt. Colonel Jeffrey Addicott, Paul Gill, Douglas A. Ramseur, Thomas J. Ridge

University of Richmond Law Review Symposium

Symposium Welcome: Alexander McDaniel, Symposium Editor, University of Richmond Law Review, and Wendy C. Perdue, Dean of the University of Richmond School of Law. (9:00 a.m. - 9:15 a.m.)

“How Does the Government Collect Data Through Surveillance?” Panel Discussion: William C. Banks, Distinguished Professor of Law at Syracuse University College of Law and Founding Director of the Institute for National Security and Counterterrorism, and Jake Laperruque, Privacy Fellow with The Constitution Project. Professor Paul D. Crane, Associate Professor at the University of Richmond School of Law, served as moderator. (9:15 a.m. - 10:30 a.m.)

“How Does the Government Retain and …


The D.C. Circuit’S En Banc Decision In Bahlul: Sui Generis Or Guidance For Future Military Commissions?, Peter Margulies 2016 Roger Williams University School of Law

The D.C. Circuit’S En Banc Decision In Bahlul: Sui Generis Or Guidance For Future Military Commissions?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The Need To Refocus The U.S. Government's Post-9/11 Counter-Terrorist Financing Strategy Directed At Al Qaeda To Target The Funding Of Isis, Jimmy Gurule 2016 Notre Dame Law School

The Need To Refocus The U.S. Government's Post-9/11 Counter-Terrorist Financing Strategy Directed At Al Qaeda To Target The Funding Of Isis, Jimmy Gurule

Jimmy Gurule

The Islamic State of Iraq and Syria ("ISIS") is the most deadly and well-funded foreign terrorist organization in the world. There are estimates that ISIS has an annual budget of over $2 billion to finance its goal of establishing a caliphate, or Islamic state, governed by its twisted version of Islamic law.1 Flush with funds, the terror group has acquired and controls large swaths of territory in Syria and Iraq, and the threat it poses extends to Jordan, Saudi Arabia, Egypt, Libya, Yemen, Lebanon, and beyond. 2 While depriving ISIS of funding is a central component of the United States …


Nsa Compliance And Congress’S Plan: How To Account For Flaws In The Metadata Program?, Peter Margulies 2016 Roger Williams University School of Law

Nsa Compliance And Congress’S Plan: How To Account For Flaws In The Metadata Program?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Threats Against America: The Second Circuit As Arbiter Of National Security Law, David Raskin 2016 U.S. Attorney in the Western District of Missouri

Threats Against America: The Second Circuit As Arbiter Of National Security Law, David Raskin

Fordham Law Review

For nearly 100 years, the U.S. Court of Appeals for the Second Circuit has been a leading force in defining and resolving the uniquely thorny issues that arise at the intersection of individual liberty and national security. The court’s decisions in this arena are characterized by its willingness to tackle difficult questions and its skill in balancing the needs of the government with the rights of the accused to ensure fundamental fairness in the ages of espionage and terror.


Bank Liability Under The Antiterrorism Act: The Mental State Requirement Under § 2333(A), Olivia G. Chalos 2016 Fordham University School of Law

Bank Liability Under The Antiterrorism Act: The Mental State Requirement Under § 2333(A), Olivia G. Chalos

Fordham Law Review

This Note specifically addresses the jurisdictional split on the mental state requirement necessary to hold a defendant liable under the ATA. This Note explores the current judicial interpretations of the statute and concludes that, as the statute stands, the Second Circuit best interprets the mental state requirement for § 2333(a) claims predicated on a violation of material support laws. This Note proposes, however, that Congress should amend the ATA to clarify the state-of-mind requirement and should only allow for a cause of action where a bank manifests heightened culpability through intentional wrongdoing in the provision of financial services to foreign …


Without Unnecessary Delay: Using Army Regulation 190–8 To Curtail Extended Detention At Sea, Meghan Claire Hammond 2016 Northwestern University School of Law

Without Unnecessary Delay: Using Army Regulation 190–8 To Curtail Extended Detention At Sea, Meghan Claire Hammond

Northwestern University Law Review

This Note analyzes instances of U.S. detention of suspected terrorists while at sea as an alternative to Guantánamo, and how this at-sea detention fits in the interplay of U.S. statutory law, procedural law, and applicable international law. Of particular interest is the dual use of military and civilian legal regimes to create a procedural-protection-free zone on board U.S. warships during a detainee’s transfer from their place of capture to the U.S. court system. The Note concludes that U.S. Army Regulation 190–8 contains language of which the purpose and intent may be analogized to the Federal Rules of Criminal Procedure requirements …


War By Legislation: The Constitutionality Of Congressional Regulation Of Detentions In Armed Conflicts, Christopher M. Ford 2016 Stockton Center for the Study of International Law, U.S. Naval War College

War By Legislation: The Constitutionality Of Congressional Regulation Of Detentions In Armed Conflicts, Christopher M. Ford

Northwestern University Law Review

In this essay, Ford considers provisions of the 2016 National Defense Authorization Act (NDAA) which place restrictions on the disposition of detainees held in Guantánamo Bay. These provisions raise substantial separation of powers issues regarding the ability of Congress to restrict detention operations of the Executive. These restrictions, and similar restrictions found in earlier NDAAs, specifically implicate the Executive's powers in foreign affairs and as Commander in Chief. Ford concludes that, with the exception of a similar provision found in the 2013 NDAA, the restrictions are constitutional.


Icrc, Nato And The U.S. – Direct Participation In Hacktivities – Targeting Private Contractors And Civilians In Cyberspace Under International Humanitarian Law, Ido Kilovaty 2016 Duke Law

Icrc, Nato And The U.S. – Direct Participation In Hacktivities – Targeting Private Contractors And Civilians In Cyberspace Under International Humanitarian Law, Ido Kilovaty

Duke Law & Technology Review

Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflicts. With that premise in mind, the question arises of whether or not a civilian carrying out cyber-attacks during an armed conflict becomes a legitimate target under international humanitarian law. This paper aims to explore this question using three different analytical and conceptual frameworks while looking at a variety of cyber-attacks along with their subsequent effects. One of the core principles of the law of armed conflict is distinction, which states that civilians in an armed conflict are granted a set of protections, mainly the protection from …


The Icc And The Security Council: How Much Support Is There For Ending Impunity?, 26 Ind. Int'l & Comp. L. Rev. 33 (2016), Stuart Ford 2016 John Marshall Law School

The Icc And The Security Council: How Much Support Is There For Ending Impunity?, 26 Ind. Int'l & Comp. L. Rev. 33 (2016), Stuart Ford

Stuart Ford

No abstract provided.


The Execution Of The Innocent In Military Tribunals: Problems From The Past And Solutions For The Future, Justin Walker 2016 University of Louisville Brandeis School of Law

The Execution Of The Innocent In Military Tribunals: Problems From The Past And Solutions For The Future, Justin Walker

West Virginia Law Review

No abstract provided.


Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin 2016 Maurer School of Law - Indiana University

Espionage As A Sovereign Right Under International Law And Its Limits, Asaf Lubin

Articles by Maurer Faculty

The literature surrounding the international legality of peacetime espionage has so far centered around one single question: whether there exist within treaty or customary international law prohibitive rules against the collection of foreign intelligence in times of peace. Lacking such rules, argue the permissivists, espionage functions within a lotus vacuum, one in which States may spy on each other and on each other's nationals with no restrictions, justifying their behavior through the argumentum ad hominem of "tu quoque." . . .


Dc Circuit In Al-Nashiri: All Clear For Military Commission Trial, Peter Margulies 2016 Roger Williams University School of Law

Dc Circuit In Al-Nashiri: All Clear For Military Commission Trial, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman 2016 Roger Williams University School of Law

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Is Immigration Law National Security Law?, Shoba S. Wadhia 2016 Penn State Dickinson School of Law

Is Immigration Law National Security Law?, Shoba S. Wadhia

Shoba Sivaprasad Wadhia

The debate around how to keep America safe and welcome newcomers is prominent. In the last year, cities and countries around the world, including Baghdad, Dhaka, Istanbul, Paris, Beirut, Mali and inside the United States - have been vulnerable to terrorist attacks and human tragedy. Meanwhile, the world faces the largest refugee crises since the Second World War. This article is based on remarks delivered at Emory Law Journal’s annual Thrower Symposium on February 11, 2016. It explores how national security concerns have shaped recent immigration policy in the Executive Branch, Congress and the states and the moral, legal and …


A Survey Of Possible Legal Responses To International Terrorism: Prevention, Punishment, And Cooperative Action, Jordan J. Paust 2016 Yale University

A Survey Of Possible Legal Responses To International Terrorism: Prevention, Punishment, And Cooperative Action, Jordan J. Paust

Georgia Journal of International & Comparative Law

No abstract provided.


Book Review: The Birth Of Nations. By Phillip C. Jessup. New York And London: Columbia University Press, 1974., Sandy McCormack 2016 Office of the Solicitor, US Department of Labor

Book Review: The Birth Of Nations. By Phillip C. Jessup. New York And London: Columbia University Press, 1974., Sandy Mccormack

Georgia Journal of International & Comparative Law

No abstract provided.


Digital Commons powered by bepress